First published: Thu Oct 03 2024(Updated: )
NVIDIA CUDA toolkit for Windows and Linux contains a vulnerability in the nvdisasm command line tool where an attacker may cause an improper validation in input issue by tricking the user into running nvdisasm on a malicious ELF file. A successful exploit of this vulnerability may lead to denial of service.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA CUDA Toolkit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0123 has been rated as a high-severity vulnerability due to the potential for denial of service.
To fix CVE-2024-0123, ensure you avoid using the nvdisasm tool on untrusted ELF files and apply any security updates provided by NVIDIA.
CVE-2024-0123 affects the NVIDIA CUDA toolkit on both Windows and Linux operating systems.
CVE-2024-0123 is not a remote exploit; it requires local access to the system to execute the nvdisasm tool.
CVE-2024-0123 is categorized as an input validation vulnerability in the NVIDIA CUDA toolkit.